Patriot Technologies, Inc., a leader in cyber security solutions for over 20 years, is pleased to announce that it has been recognized by the Frederick County Office of Economic Development with a 2015 Frederick County Business Leaders Award for their innovation and... Read More

While banks and financial firms work to modernize their infrastructures to remain competitive, the high demand nature of their business calls for increased cybersecurity. As a proof point of the severity of cybercrime we can point to recent news from the National... Read More

Studies show that nearly 50% of companies had at least one security incident during the last year prompting organizations to increase their security budgets to try to protect themselves. But, while IT has the responsibility for data breach protection, it's the business... Read More

In many ways, Hurricane Katrina was a wake-up call. The technology many of us took for granted, such as the internet, was suddenly useless. Making matters worse, many post-disaster procedures rely on these technologies, making it difficult to determine who was missing,... Read More

Any cyber attack has the potential of being expensive. Analyzing an attack, understanding what attackers were after, assessing the damage, and other post-attack procedures are all necessary but costly consequences of these kinds of breaches. Cyber attacks on critical infrastructure however, are... Read More

In 2014, Experian rightly predicted that healthcare related breaches would continue to grow in 2015. According to the Identity Theft Resource Center report, as of April 28th of this year, 93 healthcare breaches had been reported. While businesses across a number of industries... Read More

Malware, the pernicious threat, has a new form: malvertising, or "malicious advertising." What is most disturbing about this form of malware is that you don't always need to click on a piece of malvertising to infect your computer; in some cases, just... Read More

The recent crossfire incident where GitHub found itself battling to stabilize service exemplifies the critical importance of defending your network against DDoS attacks. While most US-based security experts unequivocally point the finger at CNNIN’s complicity, simply identifying the origin of threats isn’t... Read More